When we started AgileBlue we had two goals: 1. Always obsess over our customers 2. Build an autonomous SecOps platform #1 is the reason for #2! An autonomous security operations platform is the future of beating hackers. Faster, more precise, autonomous and predictive...
Tony Pietrocola
How AI and LLMs change SOAR and the Security Operations Center (SOC)
Artificial intelligence (AI) is showing early results as game-changer in cybersecurity. Obviously, AI will be a tool for both cyber defenders and unfortunately the attackers who are already pressing forward with early successes. Let’s focus on us, the defenders, the...
SOC, MDR, and SOAR Have to be a Fixed Price… Right?
If you are like me and are responsible for budgets or perhaps get yelled at over the budgets you approve, do you get cold sweats before you look at an invoice from AWS, Azure, or other platform providers with usage-based pricing models? To be candid, it's the wild...
3 Misconceptions About Vulnerability Scanning
Cybercriminals are known for their relentlessness and ability to exploit hidden vulnerabilities and misconfiguration errors across a firm’s applications, endpoints, servers, and networks. Vulnerabilities can be one of the biggest threats to a firm’s network; that’s...
A Month Check-in After a Needle-Moving Acquisition
Being a realist, we all know acquisitions can be a gamble. As an optimist, I look at them as a game changer that can be an absolute launch point to long-term success. Of course, business history is riddled with stories of acquisitions that have gone wrong, but rarely...
Top 3 Reasons SMBs Should Use SIEM
Security Information and Event Management– otherwise known as SIEM, is a cybersecurity solution that monitors an organization’s IT infrastructure by relaying actionable intelligence and allowing IT security teams to manage potential threats. SIEM provides...
Cloud Misconfiguration: What it is & How to Avoid it?
The recent rise in cyber threats comes as a result of the increase in cloud adoption across the globe, intending to increase business agility and resilience. However, that doesn’t mean electing to use cloud-based-hosted environments will make an organization more...
Old School Threat Detection Just Won’t Hack it Anymore
Global cybercrime continues to surge this year – government officials, business leaders, and software developers are scrambling to stay one step ahead of cyber criminals. Although software developers aim to create the perfectly impenetrable solution, no company can...
What’s the Difference Between My Cyber Risk Score and My Credit Score?
There are two diffs everyone has a credit score and absolutely no one understands what makes up their credit score. A cyber risk score is the exact opposite. Not every company has a cyber score or truly understands their cyber risk, but we can absolutely tell you what...
SOCs Need Automation to Win Against Growing Threats
Cyber threats have grown tremendously more sophisticated and with a global cyber talent shortage and rising costs automation is the only key to a successful SOC. Security Operations Centers (SOCs) play a critical role in helping companies of all sizes strive to...